• No results found

Flow-based detection of IPv6-specific network layer attacks

N/A
N/A
Protected

Academic year: 2021

Share "Flow-based detection of IPv6-specific network layer attacks"

Copied!
6
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Layer Attacks

Luuk Hendriks1(B), Petr Velan2, Ricardo de O. Schmidt1, Pieter-Tjerk de Boer1, and Aiko Pras1

1 Faculty of Electrical Engineering, Mathematics and Computer Science,

University of Twente, Enschede, The Netherlands

{luuk.hendriks,r.schmidt,p.t.deboer,a.pras}@utwente.nl 2 CESNET, a.l.e, Zikova 4, 160 00 Prague 6, Czech Republic

petr.velan@cesnet.cz

Abstract. With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be pos-sible and are described in the literature, no detection solutions for these attacks have been proposed. In this study we identify and characterise IPv6-specific attacks that can be detected using flow monitoring. By con-structing flow-based signatures, detection can be performed using avail-able technologies such as NetFlow and IPFIX. To validate our approach, we implemented these signatures in a prototype, monitoring two produc-tion networks and injecting attacks into the producproduc-tion traffic.

1

Introduction

Monitoring network traffic is an essential aspect in today’s Internet. With the ever-growing collection of possible network-based threats, security officers need to stay up to date and be aware of what is possibly coming towards their net-works and services. Intrusion Detection Systems (IDSs) play a critical role in this scenario, offering the first insight into malicious traffic, e.g. brute-force attacks on SSH daemons [2], or large numbers of DNS responses caused by a Distrib-uted Denial of Service (DDoS) attack. Currently, the adoption and deployment of IPv6 in the Internet is increasing: 16.4% of users of Google’s services have IPv6 connectivity. North-America and Germany feature an adoption of around 30%, and Belgium is almost at 50%. With the increasing amount of IPv6 traffic in mind, we want to know whether the flow-based detection approaches from IPv4 are applicable, and moreover, fully covering the spectrum of IPv6 attacks. In this paper, we ask ourselves 1. which new threats are introduced by these changes in the network layer; 2. how fundamental these threats are; and 3. how flow-based monitoring solutions should be adapted in order to enable detection of these new attacks.

c

 The Author(s) 2017

D. Tuncer et al. (Eds.): AIMS 2017, LNCS 10356, pp. 137–142, 2017. DOI: 10.1007/978-3-319-60774-0 11

(2)

2

Methodology

We focus on a subset of threats: we inquire the literature, and select (Sect.2.1) the vulnerabilities that are expected to be a long-term threat not easily miti-gated. With the selection of threats at hand, we analyze (Sect.2.2) their packet-based forms, to construct flow-packet-based signatures. The signatures are implemented and tested on flows collected on two production networks: (1) the National Research and Educational Network (NREN) CESNET, with 8 vantage points, totalling 2.5G of flows (87G packets, 81.2Ti bytes); and (2) the campus net-work UTNET, with a single vantage point, with 2.2G of flows (158.6G packets, 140.7Ti bytes).

2.1 Threat Selection Process

The comprehensive overview in [3] functions as a starting point in our selection process. In that paper, Tables II and III list Security Vulnerabilities and Privacy Vulnerabilities, respectively, indicating the origin of each threat. Step 1: We only consider threats originating from the design of IPv6, and not any threats based on implementation or configuration mistakes. We continue by looking at Table V of that same paper, which is a matrix linking threats to detective, preventative and/or reactive countermeasures. Step 2: We only consider threats that have either no forms of countermeasure, or only a reactive countermeasure, as our goal is detection of attacks. Lastly, we rule out threats that are not actually in IPv6 itself, but merely in other (supporting) protocols. Step 3: Dismiss threats based on DNS and ICMP6.

2.2 Threat Analysis Process

For each threat, the following steps are carried out:

1. At the packet-level, pinpoint the protocol fields and their respective values that make up the essence of the vulnerability.

2. Determine if the essential features found in the previous step are still avail-able in the aggregated form (flow level). N.B.: availability of these features depends on which Information Elements are exported by the flow exporter. Furthermore, the flow cache should in some cases use these fields in its cache key, in order to distinguish and export separate flow records. More details on this follow in Sect.3.

3. If an attack is not distinguishable based on information of a single flow, determine the relationship between malicious flows, as well as the relationship between the malicious and benign flows.

4. Formalize a signature based on the previous two steps, resulting in a per-attack detection approach.

(3)

3

Attack Signatures

Our selection process described in Sect.2.1 yields six attacks (Table2), cate-gorized as covert channels (exfiltration of information), DoS attacks (aiming to overload and impair functioning of systems) and middlebox evasion (getting around e.g. firewalls). The constructed signatures, along with their formal expla-nation, are listed in Table1. Note that we describe signatures from the

per-spective of the collector, not aggregation by the flow cache on the exporter.

The Denial of Service (DoS) signatures have two variants: the multi-flow kind describes an attack where a large number of destination addresses is generated randomly, as opposed to the kind where a single destination address is used. Nat-urally, different destination addresses lead to different flow records, and therefore different signatures.

Table 1. Signatures and notation explanation

fi Field in packet, e.g. Source Address 5t Shorthand for the 5-tuple flow-key

{f1, . . . fn} Flow-key based on fields f1. . .fn FL Flow Label (IPv6 header field) # Number of flows for flow-key or set TC Traffic Class (IPv6 header field)

ppf Packets per flow prn Protocol Numbern

pps(S) Packets per second in flow setS τ Threshold, relative to context (FK|F+) Set of flows aggregated on FK filtered on one or more filters F

F Selection filter, e.g. ppf = 1 for flows with a single packet, orpr0for Protocol 0

Flow Label Covert Channel #({FL, 5t}|FL > 0, ppf = 1) − #{5t} > τf low dif f Traffic Class Covert Channel #({TC , 5t}|TC > 0, ppf = 1) − #{5t} > τf low dif f

Multi-flow Flow Label DoS S = ({src ip}|FL > 0, ppf = 1) , pps(S) > τpps Multi-flow Fragmentation ID DoS S = ({src ip}|pr44, ppf = 1) , pps(S) > τpps Multi-flow Hop-by-Hop DoS S = ({src ip}|pr0, ppf = 1) , pps(S) > τpps Flow Label DoS #{F L, 5t} − #{5t} > τf low dif f

Fragmentation ID DoS S = ({5t}|pr44, ppf > τppf) ,pps(S) > τpps Hop-by-Hop DoS S = ({5t}|pr0, ppf > τppf) ,pps(S) > τpps Fragmentation Overlap {5t|0 < fragMinOffset ≤ 20}

An overview of requirements for flow exporters is presented in Table2. These requirements include certain fields to be incorporated in the flow cache key (distinguishing flows on those fields), and a new IPFIX Information Element to be implemented. Note that not all IANA assigned fields are exported per se.

Table 2. Flow record requirements for implementation of signatures

Threat Flow key IANA New IE

Flow Label CC {FL, 5t} id31 Traffic Class CC {TC, 5t} id5 Flow Label DoS {FL, 5t} id31 Fragmentation ID DoS {5t} id4, id54 Hop-by-Hop Option DoS {5t} id4

(4)

4

Evaluation of the Signatures

The proposed signatures are evaluated on real production traffic, in which we inject generated attacks. As the DoS attacks could harm the routers, a safe number of packets is used, likely lower than a real attack but still allowing verification of our signatures. We describe the generated attacks, and discuss the performance of the signatures with respect to both these attacks and the production traffic, below.

Generated Attacks:

Flow Label and Traffic Class Covert Channels: Sending 100, 500, 1000 packets, within a 5 min time-frame, towards a single host.

Flow Label, Fragmentation ID, Hop-by-Hop Option DoS: Sending 500 packets at line rate, towards a single host; Sending 500 packets at line rate, towards randomly generated hosts in a /64 network.

Fragmentation Overlap: Sending flows of 2, 10, 20 packets, with second packet offsets of 1, 4, 10, 20 towards a single host.

Performance:

Flow Label Covert Channel: The flow records related to the covert channel are successfully distinguished, using a threshold of τpkt = 50. No other positives were found in the dataset, meaning the signature has a low false positive rate but possibly a non-zero false negative rate.

Traffic Class Covert Channel: The Traffic Class can hold different values within a single flow, and we do observe this in production traffic. Most commonly, these are a zero and a non-zero value: including the TC-field in the aggregation thus results in two flows. Usingτfl= 10, i.e. marking flows with 10 or more different Traffic Class values as attacks, the signature distinguishes all the injected attacks from the production traffic. Similar to the Flow label Covert channel, no other positives where marked, pointing out a low false positive rate but a possible non-zero false negative rate.

Flow Label Flood: Detection of a Flow Label flood to a single destination address is similar to detecting a Flow Label covert channel, thus results are equivalent. Distinguishing the covert channel from the DoS attack is challenging. Multi-flow signature has a false positive rate, albeit because it marks other threats and not benign traffic. For example, a SYN scan has, on the flow level, vast similarities when compared to the flow label flood attack: a large number of end hosts is being connected to from a single source address, with every initiated connection having a new (thus different) Flow Label.

Hop-by-Hop Flood: As the Hop-by-Hop Options are not widely used (most of it is link local traffic, with only one or two packets per flow), simplistic thresholds for detection work:τppf = 10 suffices. This means scalable detection without the need for extra Information Elements or extra processing at the exporter is trivial. A possible form of false positives exists however, as we observed two times on the

(5)

NREN: ping sweeps with Hop-by-Hop Options match this signature. Marking the spread version of the attack is successful, without any other positives. Fragmentation Flood: Detection of flooding based on the Fragmentation ID has several caveats. By definition, a flow with fragmented packets consists of more than one packet, but an exception of this characteristic are the atomic fragments. Signatures based on fragmented but single packet flows therefore yield false positives. As the sending rate and number of sent packets are crucial in the success of a flooding attack, we can choose thresholds that eliminate these false positives:τpps= 5000/s, τppf = 200. Our attacks are identified without any other flows being marked, again pointing out a low false positive rate but a possible false negative rate. The case where destination addresses were generated and the flooding attack was hidden in a large number of different 5-tuple flows, is successfully detected.

Fragmentation Overlap: The approach based on fragMinOffset marks all our injected attacks. The lowest value observed in the production traffic was 64, so no positives other than our injected attacks were marked.

5

Conclusions

IPv6 comes with a plethora of threats specific to this new version of the IP protocol. By systematically characterising threats described in literature, we found six of these threats to be fundamental, i.e. based on the protocol specifi-cation and without detection approaches for attacks as of yet. In this study, we proposed flow-based signatures to perform such detection. By implementing a prototype, we proved the validity and limitations of these signatures, and defined the requirements for flow measurement equipment to allow for applying detec-tion of attacks based on these signatures. These requirements show adaptadetec-tions to flow equipment are necessary to enable for detection of these new attacks.

By deploying our prototype on two production networks and injecting attacks into the production traffic, we showed our signatures are able to successfully dis-tinguish the attacks from benign traffic without any false negatives. We provide both the detection prototype as well as the code used for generation of attacks as free and open source software [1].

Acknowledgments. This work has been supported by the project Reg. No. CZ.02.1.01/0.0/0.0/16 013/0001797 co-funded by the Ministry of Education, Youth and Sports of the Czech Republic and European Regional Development Fund, and the Ministry of the Interior of the Czech Republic under project no. VI20162019029.

References

1. IPv6 L3 Threat Detection.https://github.com/ut-dacs/IPv6-L3-threat-detection/ 2. Hofstede, R., Hendriks, L., Sperotto, A., Pras, A.: SSH compromise detection using

NetFlow/IPFIX. ACM SIGCOMM CCR 44(5), 20–26 (2014)

3. Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., Weippl, E.R.: IPv6 security: attacks and countermeasures in a nutshell. In: USENIX WOOT (2014)

(6)

Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Referenties

GERELATEERDE DOCUMENTEN

The simulation strategy was developed in three main steps: (i) formulation of the numerical method for incompressible flow and testing on model geometries, (ii) inclusion of

al aneurysms ISBN : 978-90-365-3433-8 Invitation Modeling and simulation of flow in cerebral aneurysms Julia Mikhal Delistraat 13 7512 BK Enschede The Netherlands

A small range of literature about brownfield development in China is available, but it does not cover how the Chinese government or other involved parties deal with soil

In section 3 we describe the data and variables, in section 4 we describe the methodology and model specifications for funding type choice and platform

Firms with high customer concentration face a higher demand uncertainty because specific investments prevent firms from easily finding alternative sales opportunities when

Although  specially  earmarked  funding  opportunities  for  systems  biology,  having  boosted  the 

doch ook - maakte Van der Schuere reedsgebruik van de eigen- sÇhap, dat bij eèn opgaande deeling hef deeltal gelijk is aan deeler X quotient (+ rest): ,,Ofte multipliceert

De gemiddelde waardering voor de kwaliteit van de haken was bij de cultivars in de tweede beoordeling 6,3 en bij de vergelijkingscultivars 7,2; het hoogst gewaardeerd werden